Information Gathering Using Backtrack

Rating :

Comments

mariawhit8at May 03,2015Very good at breaking down content. I really like this detailed explanation of metasploit and tips to run this exploit. I would have liked him to demo it on a virtual fake network.

hhammadiat May 05,2015The video is a valuable resource for Metasploit frameworks. The video also focus on the importance of Metasploit penetration testers. The video also tells how the Metasploit can be used to design and develop applications and how hacking is associated with it.

mjacobat May 06,2015Great video and introduction on Metasploit. I'd recommend checking out his youtube library for other interesting tech videos - https://www.youtube.com/user/elithecomputerguy

djohns54at May 07,2015Since coming onto a Red Team, I have had the ability to work with metasploit and it is indeed a very powerful tool. One thing that I did pick up on when trying to exploit a machine is that a lot of AV tools can pick up on your exploit before you can even successfully accomplish your tasks. That can be a great buzz killer for an attacker or Pentester for that matter. What I learned is that we as well as hackers are using what they called PEscramblers to scramble the binaries of these exploits to avoid detections. And if all else fails, they can use a tool called Hyperion that would encrypt its payload with a week 128-bit encryption key, then once on the target system, brute-force it's own encryption key then execute. Most AV's won't catch this at all because most are built on signatures and because a different encryption key can be used, the anomaly will be difference everytime.

mrgodfrey3at June 26,2015This instructor has many excellent videos on his YouTube channel. Watch them here: https://www.youtube.com/user/elithecomputerguy/videos. "Too lazy to learn Linux" is my favorite quote.